austin-taylor / bluewallLinks
Bluewall is a firewall framework designed for offensive and defensive cyber professionals.
☆106Updated 6 years ago
Alternatives and similar repositories for bluewall
Users that are interested in bluewall are comparing it to the libraries listed below
Sorting:
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆30Updated 7 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆28Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- ☆76Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- Tools for the Computer Incident Response Team☆148Updated 8 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- ☆50Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- A toolkit for Security Researchers☆129Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 8 months ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago